1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
8

You receive an email from someone who claims to be a representative from your credit card company. The email asks you to click o

n a link to reset your password to the company’s website. You should proceed with caution because the email may be a(n) _______ attempt. A. spam B. phishing C. malware D. legitimate
Computers and Technology
2 answers:
tensa zangetsu [6.8K]3 years ago
7 0

the correct answer is : phishing

cestrela7 [59]3 years ago
3 0
Here are my definitions of each option:

Spam = Unwanted mail, advertisements, etc

Phishing = Link to a site, usually a fake replica of a legitimate site but with added implements that can be used to spy on you (how people become victims of identity theft

Malware = Usually a malicious piece of code that can be used to slow down your computer or to get a hold of your computer for some other malicious reason

Legitimate = Means that the sender is valid, you know who its coming from, and you know that you won't get attacked by the email

So based on this, I would say that the answer is B. Phishing


You might be interested in
A programmer is creating an algorithm that will be used to turn on the motor to open the gate in a parking garage. The specifica
Mars2501 [29]

The algorithm which can be used to open the gate under the appropriate conditions is:

  1. Check if the time is during business hours.
  2. If Yes, check if the gate sensor is activated.
  3. If Yes, check if the gate is open.
  4. If it is No, turn on the motor.

<h3>What is an algorithm?</h3>

An algorithm can be defined as a standard formula (procedures) which comprises a set of finite steps and instructions that is typically used for solving a problem on a computer under the appropriate conditions.

This ultimately implies that, an algorithm is a standard, logical formula (procedures) containing the step-by-step rules and instructions for performing a specific task or proffering a solution to a specific problem on a computer system.

In this scenario, the algorithm which can be used to open the gate under the appropriate conditions is:

  1. Check if the time is during business hours.
  2. If Yes, check if the gate sensor is activated.
  3. If Yes, check if the gate is open.
  4. If it is No, turn on the motor.

Read more on algorithm here: brainly.com/question/24793921

5 0
2 years ago
Write one DDL statement to add a new table Project into exam1. It contains the followingthree columns:-ProjNum of char(3) type,
Goryan [66]

Answer:

Check the explanation

Explanation:

When it comes to database management systems, a query is whichever command that is used in the retrieval of data from a table. In a Structured Query Language (SQL), generally queries are more or less always made by using the SELECT statement.

I have been trying to type it here but it's not working

so kindly check the code in the attached image below

8 0
3 years ago
Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) R
Alisiya [41]

Answer:

Physical layer

Explanation:

The physical layer is responsible for the physical cable or wireless connection.

6 0
3 years ago
What would you use to see what network adapters are installed in your windows computer?
Lesechka [4]
I wouldn't see anything, because my computer does not use any network adaptors.
6 0
3 years ago
Add me on fornite buddies Lynn_.25
Anna007 [38]

i- why would u ask that

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What's the full form of SEO?
    12·2 answers
  • Data about the size and composition of a population are gathered in a survey called _____.
    6·2 answers
  • Obtain the 10’s complement of the following six-digit decimal numbers:<br><br> 123900<br><br> 980657
    10·1 answer
  • PLEASEEEEEEEEEEEEEEEEE HELPPPPPPPP
    15·1 answer
  • Discuss any five factors that hinder the application of a computer in business organisations​
    15·2 answers
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are t
    6·1 answer
  • How did transistors revolutionize the world of computers?
    15·1 answer
  • I need a 75 word Radio Ad on Why Technology should be kept in a schools budget.
    11·1 answer
  • I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!